Chris actually has 2 videos dealing with the new Web Interface for Metasploit v3. This is no reflection on Chris , but we're going to do things a little backwards. This one was ready to go, although it is the second part. The first part should be ready any minute, but I had the time now, so here it is. No use waiting, because you never know when you'll get more of it.

Either way, Chris is doing some great work here especially for those of you who are command line challenged. The new Web Interface is really impressive.

In this video we explore the revised MSFWeb interface for the Metasploit Framework 3.0. We specifically take a look at running "browser" exploits where you have to get the victim to connect back to your listening Metasploit instance. We'll use the ie_createobject exploit via the MSFweb GUI, and then we'll use the wmf_setabortproc exploit using the built in msfconsole (a new addition in MSFWeb 3.0). We'll also take a look at using custom meterpreter scripts; first to see if the victim is running in vmware and second, to clear the event logs.

Enjoy and keep an eye out for future videos. Feel free to post comments and suggestions for future videos.

i also forgot to put in the writeup, that if you set up your MSFweb on a IP address you can actually get to (like other than 127.0.0.1) you can share your MSF sessions with anyone who can access the IP (yes i know that's good and bad). thats at the end of the vid and why you see it running on 192.168.0.105 instead of 127.0.0.1.